My own personal list of resources
- Virtualization
- Privacy resources
- Programming resources
Name | Description | Link | Tags |
---|---|---|---|
CS695 at IIT Bombay | This course covers basic and advanced concepts related to the virtualization and how it enables the latest revolution of cloud computing. You will understand the various virtualization paradigms of full virtualization, para virtualization, and hardware-assisted virtualization, for CPU, memory, and I/O. You will also learn about containers and related concepts. The later part of the course will cover various advanced topics related to virtual machine live migration, modern cloud storage frameworks, and so on. The programming assignments in the course are designed to reinforce the concepts learnt in class. | Link | hypervisor , virtualization , containers |
CPU & Memory Virtualization by vmwarelabs | Self explanatory | YouTube playlist | virtualization |
Name | Description | Link | Tags |
---|---|---|---|
BrowserLeaks | BrowserLeaks is all about browsing privacy and web browser fingerprinting. Here you will find a gallery of web browser testing tools that will show you what kind of person identity data can be leaked while browsing the Internet. | Link | browser , fingerprinting |
DNS Leak Test | Check if you are vulnerable against DNS leaks | Link | dns |
Cloudflare encrypted SNI checker (ECH) | When you browse websites, there are several points where your privacy could be compromised, such as by your ISP or the coffee shop owner providing your WiFi connection. This page automatically tests whether your DNS queries and answers are encrypted, whether your DNS resolver uses DNSSEC, which version of TLS is used to connect to the page, and whether your browser supports securing the Server Name Indication (SNI) using Encrypted Client Hello (ECH). | Link | dns |
AmIUnique | Learn how identifiable you are on the Internet | Link | fingerprinting |
EFF Cover Your Tracks | See how trackers view your browser | Link | fingerprinting , ads |
Censored Planet | An Internet-wide, Longitudinal Censorship Observatory. | Link | censorship |
Privacy Guides | Massive organizations are monitoring your online activities. Privacy Guides is your central privacy and security resource to protect yourself online. | Link | censorship |
Data Collection Techniques | How third party tracking and data mining is accomplished. | Link | trackers |
Terms of Service; Didn't Read | “I have read and agree to the Terms” is the biggest lie on the web. We aim to fix that | Link | policy |
PrismBreak | Opt out of global data surveillance programs like PRISM, XKeyscore and Tempora. Help make mass surveillance of entire populations uneconomical! We all have a right to privacy, which you can exercise today by encrypting your communications and ending your reliance on proprietary services. | Link | censorship , surveillance |
EFF SSD | Tips, Tools and How-tos for Safer Online Communications by EFF | Link | surveillance |
Secure Messaging Apps Comparison | This site compares secure messaging apps from a security & privacy point of view. These include Facebook Messenger, iMessage, Skype, Signal, Google Allo, Threema, Riot, Wire, Telegram, and Wickr. | Link | messaging |
Whonix Documentation | A Crash Course in Anonymity and Security on the Internet. | Link | privacy |
JustDeleteMe | A directory of direct links to delete your account from web services. | Link | privacy |
switching.software | Ethical, easy-to-use and privacy-conscious alternatives to well-known software | Link | alternatives |
Name | Description | Link | Tags |
---|---|---|---|
nand2tetris | From Nand to Tetris: Building a Modern Computer From First Principles | Link | baremetal |
x86_64 resources | Self explanatory | x86-64 |
|
x86 resources | Self explanatory | x86 |
|
MIPS assembly | Self explanatory | mips |